Affordability, ease of deployment, and power and space constraints factor into product deployments at edge locations. However, some intangibles factor in more strongly with these types of deployments. Among them, organizations need certainty that they have deployed a highly available and reliable solution the provider will support.
Author: Jerome M. Wendt
If your head starts to hurt anytime you think about backup software licensing, join the crowd. Backup software licensing must rank as one of the most unpleasant topics to discuss in all of IT. Anytime any conversation turns to backup software licensing, one can almost see people’s heads start to hurt.
If you already use cloud storage to store some or all your archival or backup data, you are in good company. A recent survey of nearly 600 companies found that over 80 percent of them already use the cloud. This potentially creates a new challenge. They find their cloud storage needs change and they must migrate their data from one cloud to another. When this infrequent situation arises, they will find four cloud-to-cloud data migration options available to them.
Almost every enterprise in the next few years expects to introduce and adopt Kubernetes in their production environment. These same enterprises also recognize moving Kubernetes into production requires it meet the same standards as their other production platforms. Among these requirements, they must have a means to backup and recover the containerized applications they host in Kubernetes. This presents five specific backup challenges organizations should prepare to address as they host applications and data on Kubernetes.
Many organizations likely breathed out a small sigh of relief when REvil suddenly disappeared from the world’s ransomware stage. Allegedly responsible for attacks on Apple, meatpacker JBS SA and, most recently, Kaseya, few shed any tears over its disappearance.
As many are aware, Kaseya’s Virtual System Administrator (VSA) was the target of a ransomware attack over the Independence Day weekend. Two days ago, on July 6, 2021, Kaseya’s CEO, Fred Voccola, posted a video on YouTube that summarized Kaseya’s response to this attack. This blog entry contains a summary of his comments from that video. You may access the full video available through this link.
More enterprises than ever anticipate adopting Microsoft 365 online now and in the years to come. However, moving the burden of hosting Microsoft Exchange, OneDrive, SharePoint, and Teams to the Microsoft cloud can be deceiving. Microsoft still leaves the responsibility of protecting Microsoft 365 data with enterprises. In a new Competitive Intelligence report, DCIG examines four critical components a Microsoft 365 enterprise backup solution should possess. It then discusses how well the Afi SaaS Platform and Backupify deliver on them.
All enterprises contain multiple applications, databases, operating systems, hypervisors, and data types in their data centers. As such, enterprises minimally expect any modern backup software solution to protect those items. However, protecting them only scratches the surface of the needs that enterprises expect modern backup software solutions to meet.
Phishing, malware, ransomware, and DDoS attacks have captured the attention of organizations of all sizes across the globe. The prevalence of these attacks has forced organizations to acknowledge that it is a matter of when, not if, they experience one. Due to their likelihood of occurring, organizations must take action to prevent the attack from becoming a disaster. To discuss how organizations can best prepare, I am joining a panel that includes cybersecurity and DR representatives from Acronis on an upcoming DRJ.com webinar.
In the last 20 years, VMware vSphere has expanded from a nascent technology to a staple of data centers worldwide. Right alongside it, backup software that protects applications and data hosted on vSphere virtual machines (VMs) has experienced similar growth. Now as vSphere backup software enters its third decade of existence, new criteria exist for evaluating and selecting these solutions.